chompie1337 / s8_2019_2215_pocLinks
PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass
☆233Updated 5 years ago
Alternatives and similar repositories for s8_2019_2215_poc
Users that are interested in s8_2019_2215_poc are comparing it to the libraries listed below
Sorting:
- ☆172Updated 5 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆122Updated 4 years ago
- Research related☆89Updated 3 years ago
- ☆106Updated 5 years ago
- Frida-based general purpose fuzzer☆220Updated 5 years ago
- Exploits for Android Binder bug CVE-2020-0041☆251Updated 5 years ago
- ☆61Updated 10 months ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆352Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- This repository contains the tools we used in our research on the Google Titan M chip☆205Updated 3 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆155Updated 5 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆284Updated 3 months ago
- VerSprite Security Research☆171Updated 2 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆201Updated last year